-
2
-
-
51649088155
-
Conceptual Secure PN Architecture
-
December
-
M Petrova et al., "Conceptual Secure PN Architecture", IST MAGNET deliverable D2.1.1, December 2004, http://www.istmagnet.org/GetAsset. action?contentId-939330&assetId=939344
-
(2004)
IST MAGNET deliverable
-
-
Petrova, M.1
-
3
-
-
33751508709
-
Recommendation for Key Management - Part 1: General (Revised)
-
NIST Special Publication 800-57, May
-
NIST Special Publication 800-57, "Recommendation for Key Management - Part 1: General (Revised)", May 2006, http://csrc.nist.gov/publications/ nistpubs/800-57/SP800-57-Part1.pdf
-
(2006)
-
-
-
4
-
-
33750922353
-
Final version of the Network-Level Security Architecture Specification
-
IST MAGNET deliverable D4.3.2, Feburary
-
S. Mirzadeh et al. , "Final version of the Network-Level Security Architecture Specification", IST MAGNET deliverable D4.3.2, Feburary 2005, http://www.istmagnet.org/GetAsset.action?contentId=942902&assetId=943012
-
(2005)
-
-
Mirzadeh, S.1
-
5
-
-
33646048509
-
The personal PKI
-
C. J. Mitchell, editor, chapter 3, IEE, London, UK
-
C. J. Mitchell and R. Schaffelhofer. The personal PKI. In. C. J. Mitchell, editor, Security for Mobility, chapter 3, pages 35-61. IEE, London, UK, 2004.
-
(2004)
Security for Mobility
, pp. 35-61
-
-
Mitchell, C.J.1
Schaffelhofer, R.2
-
6
-
-
74549221711
-
An efficient protocol for authenticated key agreement
-
L. Law, A. Menezes, M. Qu, J. Solinas, & S. Vanstone, An efficient protocol for authenticated key agreement, Designs, Codes and Cryptography, 28(2), 2003, 119-134
-
(2003)
Designs, Codes and Cryptography
, vol.28
, Issue.2
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
7
-
-
51649102273
-
-
http://en.wikipedia.org/wiki/MQV
-
-
-
-
8
-
-
2642522597
-
Talking To Strangers: Authentication in Ad-Hoc Wireless Networks
-
Technical report, Xerox Palo Alto Research Center, Palo Alto
-
D.Balfanz, D.K.Smetters, P.Stewart and H.Chi Wong. "Talking To Strangers: Authentication in Ad-Hoc Wireless Networks". Technical report, Xerox Palo Alto Research Center, Palo Alto, 2002, http://www2.parc.com/csl/ members/balfanz/publications/loclim.pdf
-
(2002)
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Chi Wong, H.4
-
9
-
-
51649099709
-
-
NIST FIPS PUB 186-2, DIGITAL SIGNATURE STANDARD (DSS), January 2000, http://csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf
-
NIST FIPS PUB 186-2, DIGITAL SIGNATURE STANDARD (DSS), January 2000, http://csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf
-
-
-
-
11
-
-
51649124238
-
-
Fact Sheet NSA Suite B Cryptography, http://www.nsa.gov/ia/industry/ cryptosuiteb.cfm?MenuID=10,2,7
-
Fact Sheet NSA Suite B Cryptography, http://www.nsa.gov/ia/industry/ cryptosuiteb.cfm?MenuID=10,2,7
-
-
-
-
13
-
-
51649091627
-
Specification of PN networking and security components
-
December
-
M Jacobsson et al., "Specification of PN networking and security components", IST-MAGNET Beyond deliverable D2.3.1, December 2006, http://www.istmagnet.org/GetAsset.action?contentId=1111179&assetId=2253549
-
(2006)
IST-MAGNET Beyond deliverable
-
-
Jacobsson, M.1
|